Hardware Security Modules (HSM)
nShield HSMs
nShield HSMs provide a secure solution for generating encryption and signing keys, creating digital signatures, encrypting data and more.
nShield general purpose HSMs
nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management, and more. nShield hardware security modules are available in a range of FIPS 140-2 & 140-3 certified form factors and support a variety of deployment scenarios.
Our Portfolio
HSM Management and Monitoring
Cut operational costs, increase uptime, and improve efficiency by managing and overseeing your nShield HSMs from one location. Learn more about each product below.
Over 150 Entrust nShield HSM Partner Integrations
Entrust nShield HSMs provide high-assurance security for a broad range of common use cases. With more than 150 alliance partners and validated partner integrations available, our hardware security modules are uniquely built to mitigate risk and secure your critical business applications across multiple use cases.
The nShield Difference: Security World
Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:
Full Control
Security World provides strong, granular controls over the access and usage of keys and policies.
Easier Backups
Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.
Scalability and Flexibility
Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.
Streamlined HSM Operations
nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.
Security World Architecture White Paper
Unique nShield Benefits
Powerful Architecture
Combine nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.
Performance and Versatility
Three models with multiple performance tiers, including a wide range of elliptic curve cryptography (ECC) options that deliver industry-leading transaction rates.
Applications and Data Protection
The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.
Compliance
Satisfy widely recognized government and industry mandates for financial, healthcare and other sensitive data.
Accelerate Digital Transformation
Establish trust throughout the data landscape so you can confidently and safely embrace digital transformation.
Product Uses
nShield Software Products
CodeSafe
Develop and execute sensitive code within a FIPS 140-2 Level 3 certified nShield hardware security module.
Software Option Packs
Software that extends the capability of your HSMs to fit your needs.